ig-labs / EDR-ALPC-Block-POCLinks
Blocking Windows EDR agents by registering an own IPC-object in the Object Manager’s namespace (CVE-2023-3280, CVE-2024-5909, CVE-2024-20671)
☆33Updated 11 months ago
Alternatives and similar repositories for EDR-ALPC-Block-POC
Users that are interested in EDR-ALPC-Block-POC are comparing it to the libraries listed below
Sorting:
- PoC for generating bthprops.cpl module designed to be loaded by Fsquirt.exe LOLBin☆121Updated last month
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61Updated 9 months ago
- ☆106Updated last year
- ForsHops☆59Updated 10 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆136Updated last year
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆136Updated 5 months ago
- ☆64Updated last year
- ☆100Updated 2 years ago
- Shellcode Loader Utilizing ETW Events☆67Updated 11 months ago
- Arsenal of modules to beacon postex☆94Updated 2 months ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆166Updated 8 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆182Updated 3 weeks ago
- Educational proof-of-concept demonstrating DEP/NX bypass using hardware breakpoints, vectored exception handling, and instruction emulati…☆97Updated 3 months ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆107Updated 5 months ago
- Linux Process Injection via Seccomp Notifier☆81Updated 2 months ago
- ☆86Updated last year
- Windows AppLocker Driver (appid.sys) LPE☆73Updated last year
- Linker for Beacon Object Files☆149Updated this week
- This repo contains PoCs for vulnerable Windows drivers.☆126Updated last month
- Section-based payload obfuscation technique for x64☆64Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆84Updated last year
- Locate dlls and function addresses without PEB Walk and EAT parsing☆104Updated 3 months ago
- Folder Or File Delete to Get System Shell on Current Session Desktop☆47Updated last year
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆66Updated last year
- Calling the undocumented DPAPI RPC interface directly, no more calling public CryptUnprotectData!☆66Updated last week
- A process injection technique using only thread context manipulation☆41Updated 2 years ago
- ☆126Updated last year
- remote process injections using pool party techniques☆70Updated 7 months ago
- From C, Rust or Zig to binary shellcode compiler based on Mingw gcc. It allows using Win32 APIs and standard libraries without any change…☆53Updated 4 months ago